First published: Wed Jan 22 2025(Updated: )
A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the . Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
Credit: psirt@cisco.com psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/clamav | <=0.103.10+dfsg-0+deb11u1<=1.0.7+dfsg-1~deb11u2<=1.0.7+dfsg-1~deb12u1<=1.4.1+dfsg-1 | |
ClamAV |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2025-20128 is critical due to its potential to cause a denial of service condition.
To fix CVE-2025-20128, update ClamAV to a patched version as specified in the relevant security advisories.
CVE-2025-20128 affects users of ClamAV versions up to 1.4.1 and various iterations of earlier releases.
CVE-2025-20128 is an integer underflow vulnerability in the OLE2 decryption routine.
Yes, CVE-2025-20128 can be exploited by unauthenticated remote attackers to induce a denial of service.